session.go 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143
  1. package quic
  2. import (
  3. "bytes"
  4. "context"
  5. "crypto/tls"
  6. "errors"
  7. "fmt"
  8. "io"
  9. "net"
  10. "reflect"
  11. "sync"
  12. "time"
  13. "v2ray.com/core/external/github.com/lucas-clemente/quic-go/internal/ackhandler"
  14. "v2ray.com/core/external/github.com/lucas-clemente/quic-go/internal/congestion"
  15. "v2ray.com/core/external/github.com/lucas-clemente/quic-go/internal/flowcontrol"
  16. "v2ray.com/core/external/github.com/lucas-clemente/quic-go/internal/handshake"
  17. "v2ray.com/core/external/github.com/lucas-clemente/quic-go/internal/protocol"
  18. "v2ray.com/core/external/github.com/lucas-clemente/quic-go/internal/qerr"
  19. "v2ray.com/core/external/github.com/lucas-clemente/quic-go/internal/utils"
  20. "v2ray.com/core/external/github.com/lucas-clemente/quic-go/internal/wire"
  21. )
  22. type unpacker interface {
  23. Unpack(hdr *wire.Header, data []byte) (*unpackedPacket, error)
  24. }
  25. type streamGetter interface {
  26. GetOrOpenReceiveStream(protocol.StreamID) (receiveStreamI, error)
  27. GetOrOpenSendStream(protocol.StreamID) (sendStreamI, error)
  28. }
  29. type streamManager interface {
  30. GetOrOpenSendStream(protocol.StreamID) (sendStreamI, error)
  31. GetOrOpenReceiveStream(protocol.StreamID) (receiveStreamI, error)
  32. OpenStream() (Stream, error)
  33. OpenUniStream() (SendStream, error)
  34. OpenStreamSync() (Stream, error)
  35. OpenUniStreamSync() (SendStream, error)
  36. AcceptStream() (Stream, error)
  37. AcceptUniStream() (ReceiveStream, error)
  38. DeleteStream(protocol.StreamID) error
  39. UpdateLimits(*handshake.TransportParameters)
  40. HandleMaxStreamsFrame(*wire.MaxStreamsFrame) error
  41. CloseWithError(error)
  42. }
  43. type cryptoStreamHandler interface {
  44. RunHandshake() error
  45. io.Closer
  46. ConnectionState() handshake.ConnectionState
  47. }
  48. type receivedPacket struct {
  49. remoteAddr net.Addr
  50. hdr *wire.Header
  51. rcvTime time.Time
  52. data []byte
  53. buffer *packetBuffer
  54. }
  55. type closeError struct {
  56. err error
  57. remote bool
  58. sendClose bool
  59. }
  60. var errCloseForRecreating = errors.New("closing session in order to recreate it")
  61. // A Session is a QUIC session
  62. type session struct {
  63. sessionRunner sessionRunner
  64. destConnID protocol.ConnectionID
  65. srcConnID protocol.ConnectionID
  66. perspective protocol.Perspective
  67. version protocol.VersionNumber
  68. config *Config
  69. conn connection
  70. streamsMap streamManager
  71. rttStats *congestion.RTTStats
  72. cryptoStreamManager *cryptoStreamManager
  73. sentPacketHandler ackhandler.SentPacketHandler
  74. receivedPacketHandler ackhandler.ReceivedPacketHandler
  75. framer framer
  76. windowUpdateQueue *windowUpdateQueue
  77. connFlowController flowcontrol.ConnectionFlowController
  78. unpacker unpacker
  79. packer packer
  80. cryptoStreamHandler cryptoStreamHandler
  81. receivedPackets chan *receivedPacket
  82. sendingScheduled chan struct{}
  83. closeOnce sync.Once
  84. closed utils.AtomicBool
  85. // closeChan is used to notify the run loop that it should terminate
  86. closeChan chan closeError
  87. connectionClosePacket *packedPacket
  88. packetsReceivedAfterClose int
  89. ctx context.Context
  90. ctxCancel context.CancelFunc
  91. undecryptablePackets []*receivedPacket
  92. clientHelloWritten <-chan struct{}
  93. handshakeCompleteChan chan struct{} // is closed when the handshake completes
  94. handshakeComplete bool
  95. receivedFirstPacket bool
  96. receivedFirstForwardSecurePacket bool
  97. sessionCreationTime time.Time
  98. lastNetworkActivityTime time.Time
  99. // pacingDeadline is the time when the next packet should be sent
  100. pacingDeadline time.Time
  101. peerParams *handshake.TransportParameters
  102. timer *utils.Timer
  103. // keepAlivePingSent stores whether a Ping frame was sent to the peer or not
  104. // it is reset as soon as we receive a packet from the peer
  105. keepAlivePingSent bool
  106. logger utils.Logger
  107. }
  108. var _ Session = &session{}
  109. var _ streamSender = &session{}
  110. var newSession = func(
  111. conn connection,
  112. runner sessionRunner,
  113. clientDestConnID protocol.ConnectionID,
  114. destConnID protocol.ConnectionID,
  115. srcConnID protocol.ConnectionID,
  116. conf *Config,
  117. tlsConf *tls.Config,
  118. params *handshake.TransportParameters,
  119. logger utils.Logger,
  120. v protocol.VersionNumber,
  121. ) (quicSession, error) {
  122. s := &session{
  123. conn: conn,
  124. sessionRunner: runner,
  125. config: conf,
  126. srcConnID: srcConnID,
  127. destConnID: destConnID,
  128. perspective: protocol.PerspectiveServer,
  129. handshakeCompleteChan: make(chan struct{}),
  130. logger: logger,
  131. version: v,
  132. }
  133. s.preSetup()
  134. s.sentPacketHandler = ackhandler.NewSentPacketHandler(0, s.rttStats, s.logger)
  135. initialStream := newCryptoStream()
  136. handshakeStream := newCryptoStream()
  137. s.streamsMap = newStreamsMap(
  138. s,
  139. s.newFlowController,
  140. uint64(s.config.MaxIncomingStreams),
  141. uint64(s.config.MaxIncomingUniStreams),
  142. s.perspective,
  143. s.version,
  144. )
  145. s.framer = newFramer(s.streamsMap, s.version)
  146. cs, err := handshake.NewCryptoSetupServer(
  147. initialStream,
  148. handshakeStream,
  149. clientDestConnID,
  150. params,
  151. s.processTransportParameters,
  152. tlsConf,
  153. conf.Versions,
  154. v,
  155. logger,
  156. protocol.PerspectiveServer,
  157. )
  158. if err != nil {
  159. return nil, err
  160. }
  161. s.cryptoStreamHandler = cs
  162. s.packer = newPacketPacker(
  163. s.destConnID,
  164. s.srcConnID,
  165. initialStream,
  166. handshakeStream,
  167. s.sentPacketHandler,
  168. s.RemoteAddr(),
  169. nil, // no token
  170. cs,
  171. s.framer,
  172. s.receivedPacketHandler,
  173. s.perspective,
  174. s.version,
  175. )
  176. s.cryptoStreamManager = newCryptoStreamManager(cs, initialStream, handshakeStream)
  177. if err := s.postSetup(); err != nil {
  178. return nil, err
  179. }
  180. s.unpacker = newPacketUnpacker(cs, s.version)
  181. return s, nil
  182. }
  183. // declare this as a variable, such that we can it mock it in the tests
  184. var newClientSession = func(
  185. conn connection,
  186. runner sessionRunner,
  187. token []byte,
  188. origDestConnID protocol.ConnectionID,
  189. destConnID protocol.ConnectionID,
  190. srcConnID protocol.ConnectionID,
  191. conf *Config,
  192. tlsConf *tls.Config,
  193. initialPacketNumber protocol.PacketNumber,
  194. params *handshake.TransportParameters,
  195. initialVersion protocol.VersionNumber,
  196. logger utils.Logger,
  197. v protocol.VersionNumber,
  198. ) (quicSession, error) {
  199. s := &session{
  200. conn: conn,
  201. sessionRunner: runner,
  202. config: conf,
  203. srcConnID: srcConnID,
  204. destConnID: destConnID,
  205. perspective: protocol.PerspectiveClient,
  206. handshakeCompleteChan: make(chan struct{}),
  207. logger: logger,
  208. version: v,
  209. }
  210. s.preSetup()
  211. s.sentPacketHandler = ackhandler.NewSentPacketHandler(initialPacketNumber, s.rttStats, s.logger)
  212. initialStream := newCryptoStream()
  213. handshakeStream := newCryptoStream()
  214. cs, clientHelloWritten, err := handshake.NewCryptoSetupClient(
  215. initialStream,
  216. handshakeStream,
  217. origDestConnID,
  218. s.destConnID,
  219. params,
  220. s.processTransportParameters,
  221. tlsConf,
  222. initialVersion,
  223. conf.Versions,
  224. v,
  225. logger,
  226. protocol.PerspectiveClient,
  227. )
  228. if err != nil {
  229. return nil, err
  230. }
  231. s.clientHelloWritten = clientHelloWritten
  232. s.cryptoStreamHandler = cs
  233. s.cryptoStreamManager = newCryptoStreamManager(cs, initialStream, handshakeStream)
  234. s.unpacker = newPacketUnpacker(cs, s.version)
  235. s.streamsMap = newStreamsMap(
  236. s,
  237. s.newFlowController,
  238. uint64(s.config.MaxIncomingStreams),
  239. uint64(s.config.MaxIncomingUniStreams),
  240. s.perspective,
  241. s.version,
  242. )
  243. s.framer = newFramer(s.streamsMap, s.version)
  244. s.packer = newPacketPacker(
  245. s.destConnID,
  246. s.srcConnID,
  247. initialStream,
  248. handshakeStream,
  249. s.sentPacketHandler,
  250. s.RemoteAddr(),
  251. token,
  252. cs,
  253. s.framer,
  254. s.receivedPacketHandler,
  255. s.perspective,
  256. s.version,
  257. )
  258. return s, s.postSetup()
  259. }
  260. func (s *session) preSetup() {
  261. s.rttStats = &congestion.RTTStats{}
  262. s.receivedPacketHandler = ackhandler.NewReceivedPacketHandler(s.rttStats, s.logger, s.version)
  263. s.connFlowController = flowcontrol.NewConnectionFlowController(
  264. protocol.InitialMaxData,
  265. protocol.ByteCount(s.config.MaxReceiveConnectionFlowControlWindow),
  266. s.onHasConnectionWindowUpdate,
  267. s.rttStats,
  268. s.logger,
  269. )
  270. }
  271. func (s *session) postSetup() error {
  272. s.receivedPackets = make(chan *receivedPacket, protocol.MaxSessionUnprocessedPackets)
  273. s.closeChan = make(chan closeError, 1)
  274. s.sendingScheduled = make(chan struct{}, 1)
  275. s.undecryptablePackets = make([]*receivedPacket, 0, protocol.MaxUndecryptablePackets)
  276. s.ctx, s.ctxCancel = context.WithCancel(context.Background())
  277. s.timer = utils.NewTimer()
  278. now := time.Now()
  279. s.lastNetworkActivityTime = now
  280. s.sessionCreationTime = now
  281. s.windowUpdateQueue = newWindowUpdateQueue(s.streamsMap, s.connFlowController, s.framer.QueueControlFrame)
  282. return nil
  283. }
  284. // run the session main loop
  285. func (s *session) run() error {
  286. defer s.ctxCancel()
  287. go func() {
  288. if err := s.cryptoStreamHandler.RunHandshake(); err != nil {
  289. s.closeLocal(err)
  290. return
  291. }
  292. close(s.handshakeCompleteChan)
  293. }()
  294. if s.perspective == protocol.PerspectiveClient {
  295. select {
  296. case <-s.clientHelloWritten:
  297. s.scheduleSending()
  298. case closeErr := <-s.closeChan:
  299. // put the close error back into the channel, so that the run loop can receive it
  300. s.closeChan <- closeErr
  301. }
  302. }
  303. var closeErr closeError
  304. runLoop:
  305. for {
  306. // Close immediately if requested
  307. select {
  308. case closeErr = <-s.closeChan:
  309. break runLoop
  310. case <-s.handshakeCompleteChan:
  311. s.handleHandshakeComplete()
  312. default:
  313. }
  314. s.maybeResetTimer()
  315. select {
  316. case closeErr = <-s.closeChan:
  317. break runLoop
  318. case <-s.timer.Chan():
  319. s.timer.SetRead()
  320. // We do all the interesting stuff after the switch statement, so
  321. // nothing to see here.
  322. case <-s.sendingScheduled:
  323. // We do all the interesting stuff after the switch statement, so
  324. // nothing to see here.
  325. case p := <-s.receivedPackets:
  326. // Only reset the timers if this packet was actually processed.
  327. // This avoids modifying any state when handling undecryptable packets,
  328. // which could be injected by an attacker.
  329. if wasProcessed := s.handlePacketImpl(p); !wasProcessed {
  330. continue
  331. }
  332. case <-s.handshakeCompleteChan:
  333. s.handleHandshakeComplete()
  334. }
  335. now := time.Now()
  336. if timeout := s.sentPacketHandler.GetAlarmTimeout(); !timeout.IsZero() && timeout.Before(now) {
  337. // This could cause packets to be retransmitted.
  338. // Check it before trying to send packets.
  339. if err := s.sentPacketHandler.OnAlarm(); err != nil {
  340. s.closeLocal(err)
  341. }
  342. }
  343. var pacingDeadline time.Time
  344. if s.pacingDeadline.IsZero() { // the timer didn't have a pacing deadline set
  345. pacingDeadline = s.sentPacketHandler.TimeUntilSend()
  346. }
  347. if s.config.KeepAlive && !s.keepAlivePingSent && s.handshakeComplete && time.Since(s.lastNetworkActivityTime) >= s.peerParams.IdleTimeout/2 {
  348. // send a PING frame since there is no activity in the session
  349. s.logger.Debugf("Sending a keep-alive ping to keep the connection alive.")
  350. s.framer.QueueControlFrame(&wire.PingFrame{})
  351. s.keepAlivePingSent = true
  352. } else if !pacingDeadline.IsZero() && now.Before(pacingDeadline) {
  353. // If we get to this point before the pacing deadline, we should wait until that deadline.
  354. // This can happen when scheduleSending is called, or a packet is received.
  355. // Set the timer and restart the run loop.
  356. s.pacingDeadline = pacingDeadline
  357. continue
  358. }
  359. if !s.handshakeComplete && now.Sub(s.sessionCreationTime) >= s.config.HandshakeTimeout {
  360. s.closeLocal(qerr.Error(qerr.HandshakeTimeout, "Crypto handshake did not complete in time."))
  361. continue
  362. }
  363. if s.handshakeComplete && now.Sub(s.lastNetworkActivityTime) >= s.config.IdleTimeout {
  364. s.closeLocal(qerr.Error(qerr.NetworkIdleTimeout, "No recent network activity."))
  365. continue
  366. }
  367. if err := s.sendPackets(); err != nil {
  368. s.closeLocal(err)
  369. }
  370. }
  371. if err := s.handleCloseError(closeErr); err != nil {
  372. s.logger.Infof("Handling close error failed: %s", err)
  373. }
  374. s.closed.Set(true)
  375. s.logger.Infof("Connection %s closed.", s.srcConnID)
  376. s.cryptoStreamHandler.Close()
  377. return closeErr.err
  378. }
  379. func (s *session) Context() context.Context {
  380. return s.ctx
  381. }
  382. func (s *session) ConnectionState() ConnectionState {
  383. return s.cryptoStreamHandler.ConnectionState()
  384. }
  385. func (s *session) maybeResetTimer() {
  386. var deadline time.Time
  387. if s.config.KeepAlive && s.handshakeComplete && !s.keepAlivePingSent {
  388. deadline = s.lastNetworkActivityTime.Add(s.peerParams.IdleTimeout / 2)
  389. } else {
  390. deadline = s.lastNetworkActivityTime.Add(s.config.IdleTimeout)
  391. }
  392. if ackAlarm := s.receivedPacketHandler.GetAlarmTimeout(); !ackAlarm.IsZero() {
  393. deadline = utils.MinTime(deadline, ackAlarm)
  394. }
  395. if lossTime := s.sentPacketHandler.GetAlarmTimeout(); !lossTime.IsZero() {
  396. deadline = utils.MinTime(deadline, lossTime)
  397. }
  398. if !s.handshakeComplete {
  399. handshakeDeadline := s.sessionCreationTime.Add(s.config.HandshakeTimeout)
  400. deadline = utils.MinTime(deadline, handshakeDeadline)
  401. }
  402. if !s.pacingDeadline.IsZero() {
  403. deadline = utils.MinTime(deadline, s.pacingDeadline)
  404. }
  405. s.timer.Reset(deadline)
  406. }
  407. func (s *session) handleHandshakeComplete() {
  408. s.handshakeComplete = true
  409. s.handshakeCompleteChan = nil // prevent this case from ever being selected again
  410. s.sessionRunner.onHandshakeComplete(s)
  411. // The client completes the handshake first (after sending the CFIN).
  412. // We need to make sure they learn about the peer completing the handshake,
  413. // in order to stop retransmitting handshake packets.
  414. // They will stop retransmitting handshake packets when receiving the first forward-secure packet.
  415. // We need to make sure that a retransmittable forward-secure packet is sent,
  416. // independent from the application protocol.
  417. if s.perspective == protocol.PerspectiveServer {
  418. s.queueControlFrame(&wire.PingFrame{})
  419. s.sentPacketHandler.SetHandshakeComplete()
  420. }
  421. }
  422. func (s *session) handlePacketImpl(p *receivedPacket) bool /* was the packet successfully processed */ {
  423. var wasQueued bool
  424. defer func() {
  425. // Put back the packet buffer if the packet wasn't queued for later decryption.
  426. if !wasQueued {
  427. p.buffer.Release()
  428. }
  429. }()
  430. // The server can change the source connection ID with the first Handshake packet.
  431. // After this, all packets with a different source connection have to be ignored.
  432. if s.receivedFirstPacket && p.hdr.IsLongHeader && !p.hdr.SrcConnectionID.Equal(s.destConnID) {
  433. s.logger.Debugf("Dropping packet with unexpected source connection ID: %s (expected %s)", p.hdr.SrcConnectionID, s.destConnID)
  434. return false
  435. }
  436. // drop 0-RTT packets
  437. if p.hdr.Type == protocol.PacketType0RTT {
  438. return false
  439. }
  440. packet, err := s.unpacker.Unpack(p.hdr, p.data)
  441. if err != nil {
  442. if err == handshake.ErrOpenerNotYetAvailable {
  443. // Sealer for this encryption level not yet available.
  444. // Try again later.
  445. wasQueued = true
  446. s.tryQueueingUndecryptablePacket(p)
  447. return false
  448. }
  449. // This might be a packet injected by an attacker.
  450. // Drop it.
  451. s.logger.Debugf("Dropping packet that could not be unpacked. Unpack error: %s", err)
  452. return false
  453. }
  454. if s.logger.Debug() {
  455. s.logger.Debugf("<- Reading packet %#x (%d bytes) for connection %s, %s", packet.packetNumber, len(p.data), p.hdr.DestConnectionID, packet.encryptionLevel)
  456. packet.hdr.Log(s.logger)
  457. }
  458. if err := s.handleUnpackedPacket(packet, p.rcvTime); err != nil {
  459. s.closeLocal(err)
  460. return false
  461. }
  462. return true
  463. }
  464. func (s *session) handleUnpackedPacket(packet *unpackedPacket, rcvTime time.Time) error {
  465. if len(packet.data) == 0 {
  466. return qerr.MissingPayload
  467. }
  468. // The server can change the source connection ID with the first Handshake packet.
  469. if s.perspective == protocol.PerspectiveClient && !s.receivedFirstPacket && packet.hdr.IsLongHeader && !packet.hdr.SrcConnectionID.Equal(s.destConnID) {
  470. s.logger.Debugf("Received first packet. Switching destination connection ID to: %s", packet.hdr.SrcConnectionID)
  471. s.destConnID = packet.hdr.SrcConnectionID
  472. s.packer.ChangeDestConnectionID(s.destConnID)
  473. }
  474. s.receivedFirstPacket = true
  475. s.lastNetworkActivityTime = rcvTime
  476. s.keepAlivePingSent = false
  477. // The client completes the handshake first (after sending the CFIN).
  478. // We know that the server completed the handshake as soon as we receive a forward-secure packet.
  479. if s.perspective == protocol.PerspectiveClient {
  480. if !s.receivedFirstForwardSecurePacket && packet.encryptionLevel == protocol.Encryption1RTT {
  481. s.receivedFirstForwardSecurePacket = true
  482. s.sentPacketHandler.SetHandshakeComplete()
  483. }
  484. }
  485. r := bytes.NewReader(packet.data)
  486. var isRetransmittable bool
  487. for {
  488. frame, err := wire.ParseNextFrame(r, s.version)
  489. if err != nil {
  490. return err
  491. }
  492. if frame == nil {
  493. break
  494. }
  495. if ackhandler.IsFrameRetransmittable(frame) {
  496. isRetransmittable = true
  497. }
  498. if err := s.handleFrame(frame, packet.packetNumber, packet.encryptionLevel); err != nil {
  499. return err
  500. }
  501. }
  502. if err := s.receivedPacketHandler.ReceivedPacket(packet.packetNumber, packet.encryptionLevel, rcvTime, isRetransmittable); err != nil {
  503. return err
  504. }
  505. return nil
  506. }
  507. func (s *session) handleFrame(f wire.Frame, pn protocol.PacketNumber, encLevel protocol.EncryptionLevel) error {
  508. var err error
  509. wire.LogFrame(s.logger, f, false)
  510. switch frame := f.(type) {
  511. case *wire.CryptoFrame:
  512. err = s.handleCryptoFrame(frame, encLevel)
  513. case *wire.StreamFrame:
  514. err = s.handleStreamFrame(frame, encLevel)
  515. case *wire.AckFrame:
  516. err = s.handleAckFrame(frame, pn, encLevel)
  517. case *wire.ConnectionCloseFrame:
  518. s.closeRemote(qerr.Error(frame.ErrorCode, frame.ReasonPhrase))
  519. case *wire.ResetStreamFrame:
  520. err = s.handleResetStreamFrame(frame)
  521. case *wire.MaxDataFrame:
  522. s.handleMaxDataFrame(frame)
  523. case *wire.MaxStreamDataFrame:
  524. err = s.handleMaxStreamDataFrame(frame)
  525. case *wire.MaxStreamsFrame:
  526. err = s.handleMaxStreamsFrame(frame)
  527. case *wire.DataBlockedFrame:
  528. case *wire.StreamDataBlockedFrame:
  529. case *wire.StreamsBlockedFrame:
  530. case *wire.StopSendingFrame:
  531. err = s.handleStopSendingFrame(frame)
  532. case *wire.PingFrame:
  533. case *wire.PathChallengeFrame:
  534. s.handlePathChallengeFrame(frame)
  535. case *wire.PathResponseFrame:
  536. // since we don't send PATH_CHALLENGEs, we don't expect PATH_RESPONSEs
  537. err = errors.New("unexpected PATH_RESPONSE frame")
  538. case *wire.NewTokenFrame:
  539. case *wire.NewConnectionIDFrame:
  540. case *wire.RetireConnectionIDFrame:
  541. // since we don't send new connection IDs, we don't expect retirements
  542. err = errors.New("unexpected RETIRE_CONNECTION_ID frame")
  543. default:
  544. err = fmt.Errorf("unexpected frame type: %s", reflect.ValueOf(&frame).Elem().Type().Name())
  545. }
  546. return err
  547. }
  548. // handlePacket is called by the server with a new packet
  549. func (s *session) handlePacket(p *receivedPacket) {
  550. if s.closed.Get() {
  551. s.handlePacketAfterClosed(p)
  552. }
  553. // Discard packets once the amount of queued packets is larger than
  554. // the channel size, protocol.MaxSessionUnprocessedPackets
  555. select {
  556. case s.receivedPackets <- p:
  557. default:
  558. }
  559. }
  560. func (s *session) handlePacketAfterClosed(p *receivedPacket) {
  561. s.packetsReceivedAfterClose++
  562. if s.connectionClosePacket == nil {
  563. return
  564. }
  565. // exponential backoff
  566. // only send a CONNECTION_CLOSE for the 1st, 2nd, 4th, 8th, 16th, ... packet arriving
  567. for n := s.packetsReceivedAfterClose; n > 1; n = n / 2 {
  568. if n%2 != 0 {
  569. return
  570. }
  571. }
  572. s.logger.Debugf("Received %d packets after sending CONNECTION_CLOSE. Retransmitting.", s.packetsReceivedAfterClose)
  573. if err := s.conn.Write(s.connectionClosePacket.raw); err != nil {
  574. s.logger.Debugf("Error retransmitting CONNECTION_CLOSE: %s", err)
  575. }
  576. }
  577. func (s *session) handleCryptoFrame(frame *wire.CryptoFrame, encLevel protocol.EncryptionLevel) error {
  578. encLevelChanged, err := s.cryptoStreamManager.HandleCryptoFrame(frame, encLevel)
  579. if err != nil {
  580. return err
  581. }
  582. if encLevelChanged {
  583. s.tryDecryptingQueuedPackets()
  584. }
  585. return nil
  586. }
  587. func (s *session) handleStreamFrame(frame *wire.StreamFrame, encLevel protocol.EncryptionLevel) error {
  588. if encLevel < protocol.Encryption1RTT {
  589. return qerr.Error(qerr.UnencryptedStreamData, fmt.Sprintf("received unencrypted stream data on stream %d", frame.StreamID))
  590. }
  591. str, err := s.streamsMap.GetOrOpenReceiveStream(frame.StreamID)
  592. if err != nil {
  593. return err
  594. }
  595. if str == nil {
  596. // Stream is closed and already garbage collected
  597. // ignore this StreamFrame
  598. return nil
  599. }
  600. return str.handleStreamFrame(frame)
  601. }
  602. func (s *session) handleMaxDataFrame(frame *wire.MaxDataFrame) {
  603. s.connFlowController.UpdateSendWindow(frame.ByteOffset)
  604. }
  605. func (s *session) handleMaxStreamDataFrame(frame *wire.MaxStreamDataFrame) error {
  606. str, err := s.streamsMap.GetOrOpenSendStream(frame.StreamID)
  607. if err != nil {
  608. return err
  609. }
  610. if str == nil {
  611. // stream is closed and already garbage collected
  612. return nil
  613. }
  614. str.handleMaxStreamDataFrame(frame)
  615. return nil
  616. }
  617. func (s *session) handleMaxStreamsFrame(frame *wire.MaxStreamsFrame) error {
  618. return s.streamsMap.HandleMaxStreamsFrame(frame)
  619. }
  620. func (s *session) handleResetStreamFrame(frame *wire.ResetStreamFrame) error {
  621. str, err := s.streamsMap.GetOrOpenReceiveStream(frame.StreamID)
  622. if err != nil {
  623. return err
  624. }
  625. if str == nil {
  626. // stream is closed and already garbage collected
  627. return nil
  628. }
  629. return str.handleResetStreamFrame(frame)
  630. }
  631. func (s *session) handleStopSendingFrame(frame *wire.StopSendingFrame) error {
  632. str, err := s.streamsMap.GetOrOpenSendStream(frame.StreamID)
  633. if err != nil {
  634. return err
  635. }
  636. if str == nil {
  637. // stream is closed and already garbage collected
  638. return nil
  639. }
  640. str.handleStopSendingFrame(frame)
  641. return nil
  642. }
  643. func (s *session) handlePathChallengeFrame(frame *wire.PathChallengeFrame) {
  644. s.queueControlFrame(&wire.PathResponseFrame{Data: frame.Data})
  645. }
  646. func (s *session) handleAckFrame(frame *wire.AckFrame, pn protocol.PacketNumber, encLevel protocol.EncryptionLevel) error {
  647. if err := s.sentPacketHandler.ReceivedAck(frame, pn, encLevel, s.lastNetworkActivityTime); err != nil {
  648. return err
  649. }
  650. if encLevel == protocol.Encryption1RTT {
  651. s.receivedPacketHandler.IgnoreBelow(s.sentPacketHandler.GetLowestPacketNotConfirmedAcked())
  652. }
  653. return nil
  654. }
  655. // closeLocal closes the session and send a CONNECTION_CLOSE containing the error
  656. func (s *session) closeLocal(e error) {
  657. s.closeOnce.Do(func() {
  658. s.sessionRunner.retireConnectionID(s.srcConnID)
  659. s.closeChan <- closeError{err: e, sendClose: true, remote: false}
  660. })
  661. }
  662. // destroy closes the session without sending the error on the wire
  663. func (s *session) destroy(e error) {
  664. s.closeOnce.Do(func() {
  665. s.sessionRunner.removeConnectionID(s.srcConnID)
  666. s.closeChan <- closeError{err: e, sendClose: false, remote: false}
  667. })
  668. }
  669. // closeForRecreating closes the session in order to recreate it immediately afterwards
  670. // It returns the first packet number that should be used in the new session.
  671. func (s *session) closeForRecreating() protocol.PacketNumber {
  672. s.destroy(errCloseForRecreating)
  673. nextPN, _ := s.sentPacketHandler.PeekPacketNumber()
  674. return nextPN
  675. }
  676. func (s *session) closeRemote(e error) {
  677. s.closeOnce.Do(func() {
  678. s.sessionRunner.removeConnectionID(s.srcConnID)
  679. s.closeChan <- closeError{err: e, remote: true}
  680. })
  681. }
  682. // Close the connection. It sends a qerr.PeerGoingAway.
  683. // It waits until the run loop has stopped before returning
  684. func (s *session) Close() error {
  685. s.closeLocal(nil)
  686. <-s.ctx.Done()
  687. return nil
  688. }
  689. func (s *session) CloseWithError(code protocol.ApplicationErrorCode, e error) error {
  690. s.closeLocal(qerr.Error(qerr.ErrorCode(code), e.Error()))
  691. <-s.ctx.Done()
  692. return nil
  693. }
  694. func (s *session) handleCloseError(closeErr closeError) error {
  695. if closeErr.err == nil {
  696. closeErr.err = qerr.PeerGoingAway
  697. }
  698. var quicErr *qerr.QuicError
  699. var ok bool
  700. if quicErr, ok = closeErr.err.(*qerr.QuicError); !ok {
  701. quicErr = qerr.ToQuicError(closeErr.err)
  702. }
  703. // Don't log 'normal' reasons
  704. if quicErr.ErrorCode == qerr.PeerGoingAway || quicErr.ErrorCode == qerr.NetworkIdleTimeout {
  705. s.logger.Infof("Closing connection %s.", s.srcConnID)
  706. } else {
  707. s.logger.Errorf("Closing session with error: %s", closeErr.err.Error())
  708. }
  709. s.streamsMap.CloseWithError(quicErr)
  710. if !closeErr.sendClose {
  711. return nil
  712. }
  713. // If this is a remote close we're done here
  714. if closeErr.remote {
  715. return nil
  716. }
  717. // otherwise send a CONNECTION_CLOSE
  718. return s.sendConnectionClose(quicErr)
  719. }
  720. func (s *session) processTransportParameters(params *handshake.TransportParameters) {
  721. s.peerParams = params
  722. s.streamsMap.UpdateLimits(params)
  723. s.packer.HandleTransportParameters(params)
  724. s.connFlowController.UpdateSendWindow(params.InitialMaxData)
  725. // the crypto stream is the only open stream at this moment
  726. // so we don't need to update stream flow control windows
  727. }
  728. func (s *session) sendPackets() error {
  729. s.pacingDeadline = time.Time{}
  730. sendMode := s.sentPacketHandler.SendMode()
  731. if sendMode == ackhandler.SendNone { // shortcut: return immediately if there's nothing to send
  732. return nil
  733. }
  734. numPackets := s.sentPacketHandler.ShouldSendNumPackets()
  735. var numPacketsSent int
  736. sendLoop:
  737. for {
  738. switch sendMode {
  739. case ackhandler.SendNone:
  740. break sendLoop
  741. case ackhandler.SendAck:
  742. // If we already sent packets, and the send mode switches to SendAck,
  743. // we've just become congestion limited.
  744. // There's no need to try to send an ACK at this moment.
  745. if numPacketsSent > 0 {
  746. return nil
  747. }
  748. // We can at most send a single ACK only packet.
  749. // There will only be a new ACK after receiving new packets.
  750. // SendAck is only returned when we're congestion limited, so we don't need to set the pacingt timer.
  751. return s.maybeSendAckOnlyPacket()
  752. case ackhandler.SendPTO:
  753. if err := s.sendProbePacket(); err != nil {
  754. return err
  755. }
  756. numPacketsSent++
  757. case ackhandler.SendRetransmission:
  758. sentPacket, err := s.maybeSendRetransmission()
  759. if err != nil {
  760. return err
  761. }
  762. if sentPacket {
  763. numPacketsSent++
  764. // This can happen if a retransmission queued, but it wasn't necessary to send it.
  765. // e.g. when an Initial is queued, but we already received a packet from the server.
  766. }
  767. case ackhandler.SendAny:
  768. sentPacket, err := s.sendPacket()
  769. if err != nil {
  770. return err
  771. }
  772. if !sentPacket {
  773. break sendLoop
  774. }
  775. numPacketsSent++
  776. default:
  777. return fmt.Errorf("BUG: invalid send mode %d", sendMode)
  778. }
  779. if numPacketsSent >= numPackets {
  780. break
  781. }
  782. sendMode = s.sentPacketHandler.SendMode()
  783. }
  784. // Only start the pacing timer if we sent as many packets as we were allowed.
  785. // There will probably be more to send when calling sendPacket again.
  786. if numPacketsSent == numPackets {
  787. s.pacingDeadline = s.sentPacketHandler.TimeUntilSend()
  788. }
  789. return nil
  790. }
  791. func (s *session) maybeSendAckOnlyPacket() error {
  792. packet, err := s.packer.MaybePackAckPacket()
  793. if err != nil {
  794. return err
  795. }
  796. if packet == nil {
  797. return nil
  798. }
  799. s.sentPacketHandler.SentPacket(packet.ToAckHandlerPacket())
  800. return s.sendPackedPacket(packet)
  801. }
  802. // maybeSendRetransmission sends retransmissions for at most one packet.
  803. // It takes care that Initials aren't retransmitted, if a packet from the server was already received.
  804. func (s *session) maybeSendRetransmission() (bool, error) {
  805. var retransmitPacket *ackhandler.Packet
  806. for {
  807. retransmitPacket = s.sentPacketHandler.DequeuePacketForRetransmission()
  808. if retransmitPacket == nil {
  809. return false, nil
  810. }
  811. // Don't retransmit Initial packets if we already received a response.
  812. // An Initial might have been retransmitted multiple times before we receive a response.
  813. // As soon as we receive one response, we don't need to send any more Initials.
  814. if s.perspective == protocol.PerspectiveClient && s.receivedFirstPacket && retransmitPacket.PacketType == protocol.PacketTypeInitial {
  815. s.logger.Debugf("Skipping retransmission of packet %d. Already received a response to an Initial.", retransmitPacket.PacketNumber)
  816. continue
  817. }
  818. break
  819. }
  820. s.logger.Debugf("Dequeueing retransmission for packet 0x%x", retransmitPacket.PacketNumber)
  821. packets, err := s.packer.PackRetransmission(retransmitPacket)
  822. if err != nil {
  823. return false, err
  824. }
  825. ackhandlerPackets := make([]*ackhandler.Packet, len(packets))
  826. for i, packet := range packets {
  827. ackhandlerPackets[i] = packet.ToAckHandlerPacket()
  828. }
  829. s.sentPacketHandler.SentPacketsAsRetransmission(ackhandlerPackets, retransmitPacket.PacketNumber)
  830. for _, packet := range packets {
  831. if err := s.sendPackedPacket(packet); err != nil {
  832. return false, err
  833. }
  834. }
  835. return true, nil
  836. }
  837. func (s *session) sendProbePacket() error {
  838. p, err := s.sentPacketHandler.DequeueProbePacket()
  839. if err != nil {
  840. return err
  841. }
  842. s.logger.Debugf("Sending a retransmission for %#x as a probe packet.", p.PacketNumber)
  843. packets, err := s.packer.PackRetransmission(p)
  844. if err != nil {
  845. return err
  846. }
  847. ackhandlerPackets := make([]*ackhandler.Packet, len(packets))
  848. for i, packet := range packets {
  849. ackhandlerPackets[i] = packet.ToAckHandlerPacket()
  850. }
  851. s.sentPacketHandler.SentPacketsAsRetransmission(ackhandlerPackets, p.PacketNumber)
  852. for _, packet := range packets {
  853. if err := s.sendPackedPacket(packet); err != nil {
  854. return err
  855. }
  856. }
  857. return nil
  858. }
  859. func (s *session) sendPacket() (bool, error) {
  860. if isBlocked, offset := s.connFlowController.IsNewlyBlocked(); isBlocked {
  861. s.framer.QueueControlFrame(&wire.DataBlockedFrame{DataLimit: offset})
  862. }
  863. s.windowUpdateQueue.QueueAll()
  864. packet, err := s.packer.PackPacket()
  865. if err != nil || packet == nil {
  866. return false, err
  867. }
  868. s.sentPacketHandler.SentPacket(packet.ToAckHandlerPacket())
  869. if err := s.sendPackedPacket(packet); err != nil {
  870. return false, err
  871. }
  872. return true, nil
  873. }
  874. func (s *session) sendPackedPacket(packet *packedPacket) error {
  875. defer packet.buffer.Release()
  876. s.logPacket(packet)
  877. return s.conn.Write(packet.raw)
  878. }
  879. func (s *session) sendConnectionClose(quicErr *qerr.QuicError) error {
  880. packet, err := s.packer.PackConnectionClose(&wire.ConnectionCloseFrame{
  881. ErrorCode: quicErr.ErrorCode,
  882. ReasonPhrase: quicErr.ErrorMessage,
  883. })
  884. if err != nil {
  885. return err
  886. }
  887. s.connectionClosePacket = packet
  888. s.logPacket(packet)
  889. return s.conn.Write(packet.raw)
  890. }
  891. func (s *session) logPacket(packet *packedPacket) {
  892. if !s.logger.Debug() {
  893. // We don't need to allocate the slices for calling the format functions
  894. return
  895. }
  896. s.logger.Debugf("-> Sending packet 0x%x (%d bytes) for connection %s, %s", packet.header.PacketNumber, len(packet.raw), s.srcConnID, packet.EncryptionLevel())
  897. packet.header.Log(s.logger)
  898. for _, frame := range packet.frames {
  899. wire.LogFrame(s.logger, frame, true)
  900. }
  901. }
  902. // GetOrOpenStream either returns an existing stream, a newly opened stream, or nil if a stream with the provided ID is already closed.
  903. // It is *only* needed for gQUIC's H2.
  904. // It will be removed as soon as gQUIC moves towards the IETF H2/QUIC stream mapping.
  905. func (s *session) GetOrOpenStream(id protocol.StreamID) (Stream, error) {
  906. str, err := s.streamsMap.GetOrOpenSendStream(id)
  907. if str != nil {
  908. if bstr, ok := str.(Stream); ok {
  909. return bstr, err
  910. }
  911. return nil, fmt.Errorf("Stream %d is not a bidirectional stream", id)
  912. }
  913. // make sure to return an actual nil value here, not an Stream with value nil
  914. return nil, err
  915. }
  916. // AcceptStream returns the next stream openend by the peer
  917. func (s *session) AcceptStream() (Stream, error) {
  918. return s.streamsMap.AcceptStream()
  919. }
  920. func (s *session) AcceptUniStream() (ReceiveStream, error) {
  921. return s.streamsMap.AcceptUniStream()
  922. }
  923. // OpenStream opens a stream
  924. func (s *session) OpenStream() (Stream, error) {
  925. return s.streamsMap.OpenStream()
  926. }
  927. func (s *session) OpenStreamSync() (Stream, error) {
  928. return s.streamsMap.OpenStreamSync()
  929. }
  930. func (s *session) OpenUniStream() (SendStream, error) {
  931. return s.streamsMap.OpenUniStream()
  932. }
  933. func (s *session) OpenUniStreamSync() (SendStream, error) {
  934. return s.streamsMap.OpenUniStreamSync()
  935. }
  936. func (s *session) newStream(id protocol.StreamID) streamI {
  937. flowController := s.newFlowController(id)
  938. return newStream(id, s, flowController, s.version)
  939. }
  940. func (s *session) newFlowController(id protocol.StreamID) flowcontrol.StreamFlowController {
  941. var initialSendWindow protocol.ByteCount
  942. if s.peerParams != nil {
  943. if id.Type() == protocol.StreamTypeUni {
  944. initialSendWindow = s.peerParams.InitialMaxStreamDataUni
  945. } else {
  946. if id.InitiatedBy() == s.perspective {
  947. initialSendWindow = s.peerParams.InitialMaxStreamDataBidiLocal
  948. } else {
  949. initialSendWindow = s.peerParams.InitialMaxStreamDataBidiRemote
  950. }
  951. }
  952. }
  953. return flowcontrol.NewStreamFlowController(
  954. id,
  955. s.connFlowController,
  956. protocol.InitialMaxStreamData,
  957. protocol.ByteCount(s.config.MaxReceiveStreamFlowControlWindow),
  958. initialSendWindow,
  959. s.onHasStreamWindowUpdate,
  960. s.rttStats,
  961. s.logger,
  962. )
  963. }
  964. // scheduleSending signals that we have data for sending
  965. func (s *session) scheduleSending() {
  966. select {
  967. case s.sendingScheduled <- struct{}{}:
  968. default:
  969. }
  970. }
  971. func (s *session) tryQueueingUndecryptablePacket(p *receivedPacket) {
  972. if s.handshakeComplete {
  973. s.logger.Debugf("Received undecryptable packet from %s after the handshake (%d bytes)", p.remoteAddr.String(), len(p.data))
  974. return
  975. }
  976. if len(s.undecryptablePackets)+1 > protocol.MaxUndecryptablePackets {
  977. s.logger.Infof("Dropping undecrytable packet (%d bytes). Undecryptable packet queue full.", len(p.data))
  978. return
  979. }
  980. s.logger.Infof("Queueing packet (%d bytes) for later decryption", len(p.data))
  981. s.undecryptablePackets = append(s.undecryptablePackets, p)
  982. }
  983. func (s *session) tryDecryptingQueuedPackets() {
  984. for _, p := range s.undecryptablePackets {
  985. s.handlePacket(p)
  986. }
  987. s.undecryptablePackets = s.undecryptablePackets[:0]
  988. }
  989. func (s *session) queueControlFrame(f wire.Frame) {
  990. s.framer.QueueControlFrame(f)
  991. s.scheduleSending()
  992. }
  993. func (s *session) onHasStreamWindowUpdate(id protocol.StreamID) {
  994. s.windowUpdateQueue.AddStream(id)
  995. s.scheduleSending()
  996. }
  997. func (s *session) onHasConnectionWindowUpdate() {
  998. s.windowUpdateQueue.AddConnection()
  999. s.scheduleSending()
  1000. }
  1001. func (s *session) onHasStreamData(id protocol.StreamID) {
  1002. s.framer.AddActiveStream(id)
  1003. s.scheduleSending()
  1004. }
  1005. func (s *session) onStreamCompleted(id protocol.StreamID) {
  1006. if err := s.streamsMap.DeleteStream(id); err != nil {
  1007. s.closeLocal(err)
  1008. }
  1009. }
  1010. func (s *session) LocalAddr() net.Addr {
  1011. return s.conn.LocalAddr()
  1012. }
  1013. func (s *session) RemoteAddr() net.Addr {
  1014. return s.conn.RemoteAddr()
  1015. }
  1016. func (s *session) GetVersion() protocol.VersionNumber {
  1017. return s.version
  1018. }